Computer Science and Information Security
- Sheridan Libraries
- Guides
- Computer Science and Information Security
- Information Security
Technical, business-related, and global information about computer science and information security.
Librarian
Information about Info Security
The full lists of databases with information about various aspects of information security are:
Preprint/eprint Repository
Tips about specific databases or series:
- Lecture Notes in Computer Science -- This series includes the papers from Eurocrypt, Asiacrypt, and Crypto.
You can search each volume separately in the library catalog, or search Google Scholar for the paper and then use FINDIT. - The Diplomat -- A daily news feed and monthly magazine that focuses on news and interest on the Asia Pacific area. (You can sort by YEAR as well as Relevance, but NOTE: it changes back to Relevance with every search. Also: “cybersecurity” can also be spelled “cyber security,” so use both, with OR.)
Business Information
- ABI/INFORM -- Business news and information
- Gartner -- Reports and information about technology and communications industries
- For marketing reports and other business information, use the databases in the Business list
Some of the national and international agreements, frameworks, laws, and information about cybersecurity.
Maryland
- Department of Information Technology - Cybersecurity
-- Cybersecurity 2023 - Year in Review - Joint Committee on Cybersecurity, Information Technology, and Biotechnology
- Open Maryland (a business-related site) -- Cybersecurity and IT
United States
- National Conference of State Legislatures, Cybersecurity Legislation 2022 and cybersecurity news
- National Cybersecurity Strategy (Department of Energy, September 2018)
---Up to date cybersecurity news from the DoE's Office of Cybersecurity, Energy Security, and Emergency Response - National Cybersecurity Strategy (The White House; March 2023)
- NIST CSF Resource Center
--NIST Cybersecurity Framework 2.0 (February 2024) - Organization of American States (OAS) Inter-American Cooperation Portal on Cybercrime
- "Sarbanes-Oxley Act" -- This 2002 law passed during the 107th Congress; its real name is "U.S. Public Company Accounting Reform and Investor Protection Act." Some sections affect IT security policies, especially 301, 302, 404, and 409.
International
- Budapest Convention on Cybercrime of the Council of Europe ("Budapest Convention")
Examples of corporate reports about threats to cybersecurity -- current as of September 2023
These reports are free, but most require registration (because they will sell your information).
- Accenture -- State of Cybersecurity Resilience 2023 ; Cyber Threat Intelligence Report, February 2022
- Cisco -- 2024 Cisco Cybersecurity Readiness Index
- Cloudflare -- Cloudflare 2023 Year in Review (blog; December 2023)
- ESET -- Cybersecurity Trends 2023: Securing our Hybrid Lives (December 2022)
- Fortinet -- 1H 2023 Global Threat Landscape Report
- IBM -- Cost of a Data Breach Report 2024
- Mandiant -- M-Trends 2024 Special Report
- Trellix -- The Cyberthreat Report June 2023
(Note: In October 2021, McAfee and Fireeye merged, and the new company name is Trellix) - verizon -- 2023 Data Breach Investigations Report
Job Outlook
- Information Security Analysts - Occupational Outlook Handbook, U.S. Bureau of Labor Statistics
- Energy Department (DOE) -- Office of Cybersecurity, Energy Security, and Emergency Response
- Federal Communications Commission (FCC) -- Cybersecurity for Small Businesses (includes more U.S. gov resources)
- Health and Human Services Department (DHHS) -- HHS Cybersecurity Program
- Homeland Security -- CISA (Cybersecurity and Infrastructure Security Agency)
- National Institute of Standards and Technology (NIST)
---National Initiative for Cybersecurity Education (NICE); here is the NICE Cybersecurity Workforce Framework
---National Vulnerability Database (NVD) - a repository of " repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security related software flaws, product names, and impact metrics." - National Security Agency (NSA) -- Cybersecurity
- Office of the National Coordinator for Health Information Technology (HealthIT.gov)
Begin by looking at the Standards pages of the Engineering guide.
More information:
You can search everybody's standards on the IHS store.
- You can sort by "Best match" or several other ways; to sort by most recent first, use "Publication date, descending"
- Click "quick view" to see the abstract
For Capstone help, please see this page.
For language Help
- English as a Second Language classes -- Center for Language Education (Krieger)
For Writing Help
- Make an appointment with the Writing Center and/or ESL Consultations (Center for Learning Education [CLE; Whiting])
- Remember that these places will not proofread your work